NSPW 2008 Call For Papers
2008 New Security Paradigms Workshop
Plumpjack Squaw Valley Inn, Lake Tahoe, CA, USA -- September
22-25, 2008
Call for Papers and Participation
The computers of the world are under siege. Denial of
service attacks plague commercial sites, large and small. Major
companies are hacked for consumer credit card numbers. Phishing
attacks for personal information are commonplace, and million-machine
botnets are a reality. Our tools for combating these
threats--cryptography, firewalls, access controls, vulnerability
scanners, malware and intrusion detectors--are insufficient. We need
radical new solutions, but most security researchers propose only
incremental improvements. Since 1992, the New Security Paradigm
Workshop (NSPW) has been a home for research that addresses the
fundamental limitations of current work in information security.
NSPW welcomes unconventional, promising solutions to important
problems and critiques of standard security practice. To facilitate
research interactions, NSPW features supportive paper presentations,
extended discussions, group meals, and shared activities, all in
attractive surroundings. By encouraging researchers to think "outside
the box" and giving them an opportunity to communicate with
open-minded peers, NSPW fosters paradigm shifts in the field of
information security.
In 2008, NSPW will be held in Lake Tahoe (Olympic Valley, CA) at the
Plumpjack Squaw Valley
Inn, from September 22nd to 25th. We will accept about a dozen
papers and invite the authors to attend the three-day workshop. One
author of each accepted paper must attend NSPW; other authors may
attend on a space-available basis. In order to ensure that all papers
receive equally strong feedback, all attendees are expected to stay
for the entire duration of the workshop. (We expect to offer a
limited amount of financial aid to those who absolutely require it.)
Final proceedings are published after the workshop. Authors always
revise their papers to include feedback received at NSPW.
Important Dates.
- The submission deadline is April 18, 2008, 23:59 (GMT -12,
or Y time).
- Notification of acceptance will be June 3, 2008.
- Camera-ready papers for pre-proceedings due August 28, 2008.
- Camera-ready papers for proceedings due November 1, 2008.
Submissions. NSPW welcomes papers that
present a significant shift in thinking about difficult security
issues, build on such a recent shift, offer a contrarian view of
accepted practice or policy, or address non-technological aspects of
security. Our program committee particularly looks for new approaches
to information security, early thinking on new topics, innovative
solutions to long-time problems, and controversial issues which might
not be accepted at other conferences but merit a hearing. We
discourage papers that represent completed or established works, or
offer incremental improvements to well-established models. NSPW
expects a high level of scholarship from contributors, including
awareness of prior work produced before the World Wide Web.
We welcome three categories of submission:
- Research papers should be of a length commensurate with
the significance of the work and the amount of material that the
reviewer must assimilate for evaluation.
- Position papers should be 5-10 pages in length and should
espouse a well reasoned and carefully documented position on a
security related topic that merits challenge and/or discussion.
- Discussion panel proposals should include an in-depth
description of the topic to be discussed, an argument for why the
topic will lead to a lively discussion, and other optional
supporting materials such as the credentials of the proposed
panelists.
Submissions are accepted at www.nspw.org. Submissions should be in
PDF format and should include justification and attendance statements.
A justification statement specifies the category of your submission
and describes, in one page or less, why your submission is appropriate
for NSPW. A good justification will describe the new approach being
proposed, explain how it departs from existing theory or practice, and
identify those aspects of the status quo it challenges or rejects. An
attendance statement specifies which of the authors wish to attend the
workshop. Accepted papers require the attendance of at least one
author for the entire duration of the workshop. As attendance is
limited, we cannot guarantee space for more than one author.
All submissions are treated as confidential, both as a matter of
policy and in accordance with the U.S. Copyright Act of 1976.
Workshop proceedings will be published by the ACM and put in the ACM
digital library. As such, prospective authors are encouraged (but not
required) to submit their manuscripts in the format of ACM SIG
proceedings, preferably using the corresponding template.
Submissions accompanied by nondisclosure agreement forms will not be
considered. No submission to NSPW may have been published elsewhere
nor may a similar submission be under consideration for publication or
presentation in any other forum during the NSPW review process. NSPW,
like other research and technical conferences and journals, prohibits
these practices and may, on the recommendation of a program chair,
take action against authors who have committed them. In some cases,
program committees may discreetly share information about submitted
papers with other conference chairs and journal editors to ensure the
integrity of papers under consideration. If a violation of these
principles is found, sanctions may include, but are not limited to,
barring the authors from submitting to or participating in future NSPW
meetings for a set period, contacting the authors' institutions, and
publicizing the details of the case. Authors uncertain whether their
submission meets the NSPW guidelines should contact the program
chairs.
NSPW 2008 Organizers:
|
|
General Chair: |
Matt Bishop (bishop at cs.ucdavis.edu), University of California, Davis, US |
|
|
Program Committee Co-Chairs: |
Angelos Keromytis (angelos at cs.columbia.edu), Columbia
University, US |
|
Anil Somayaji (soma at scs.carleton.ca), Carleton
University, Canada |
|
|
Program Committee: |
Matt Beaumont-Gay, University of California, Los
Angeles, US |
|
Kosta Beznosov, University of British Columbia,
Canada |
|
Matt Bishop, University of California, Davis,
US |
|
Steve Borbash, US Department of Defense
|
|
Stanley Chow, Alcatel-Lucent Bell Labs,
Canada |
|
Keith Edwards, Georgia Institute of Technology,
US |
|
Jan Feyereisl, University of Nottingham, UK
|
|
Stephanie Forrest, University of New Mexico,
US |
|
Carrie Gates, CA Labs, US |
|
Steven J. Greenwald, Independent Consultant,
US |
|
Jeffrey Hunker, Carnegie Mellon University,
US |
|
Klaus Kursawe, Philips Research, Netherlands
|
|
Michael Locasto, Dartmouth College, US
|
|
Carla Marceau, Architecture Technology Corporation,
US |
|
Ken Olthoff, U.S. Department of Defense, US |
|
Paul Van Oorschot, Carleton University, Canada |
|
Christian Probst, Technical University of
Denmark |
|
Vidyaraman Sankaranarayanan, University at
Buffalo, US |
|
M. Angela Sasse, University College London,
UK |
|
Jon Solworth, University of Illinois at Chicago,
US |
|
Brian Snow, Independent Security Advisor,
US |
|
Carol Taylor, Eastern Washington University,
US |
|